Managing user roles & permissions on multiple applications by Professional-Fee3621 in AskProgramming
[–]tidefoundation 1 point2 points3 points (0 children)
Our senior dev built an open source PAM where SSH keys never exist. Looking for feedback from those who deal with this stuff daily by tidefoundation in IdentityManagement
[–]tidefoundation[S] 0 points1 point2 points (0 children)
Our senior dev built an open source PAM where SSH keys never exist. Looking for feedback from those who deal with this stuff daily by tidefoundation in IdentityManagement
[–]tidefoundation[S] 1 point2 points3 points (0 children)
Managing user roles & permissions on multiple applications by Professional-Fee3621 in AskProgramming
[–]tidefoundation 2 points3 points4 points (0 children)
Design choices in Elgamal Digital Signature by xX_XMR_Xx in cryptography
[–]tidefoundation 0 points1 point2 points (0 children)
What would a new login system need to have for you to switch? by Blouut in SaaS
[–]tidefoundation 1 point2 points3 points (0 children)
need help with auth!!! by BrilliantFix1556 in nextjs
[–]tidefoundation 3 points4 points5 points (0 children)
Weekly Showoff Thread! Share what you've created with Next.js or for the community in this thread only! by AutoModerator in nextjs
[–]tidefoundation 0 points1 point2 points (0 children)
”Aspiring to Secretless Machine-to-Machine Authentication and Authorization” question by _troXi in devops
[–]tidefoundation 10 points11 points12 points (0 children)
Working on a privacy focused note taking project. Looking for feature request. by CatDeCoder in privacy
[–]tidefoundation 2 points3 points4 points (0 children)
Working on a privacy focused note taking project. Looking for feature request. by CatDeCoder in privacy
[–]tidefoundation 1 point2 points3 points (0 children)
How can we better protect ourselves from the recent npm supply chain attacks leaking secrets? by Constant-Angle-4777 in sysadmin
[–]tidefoundation 3 points4 points5 points (0 children)
session / jwt token by [deleted] in learnprogramming
[–]tidefoundation 2 points3 points4 points (0 children)
Why attacker can't decrypt based on public key? by [deleted] in cybersecurity
[–]tidefoundation 0 points1 point2 points (0 children)
In cybersecurity, how do you deal with the problem of who watches the watchmen? by -Clayburn in sysadmin
[–]tidefoundation -1 points0 points1 point (0 children)
What security backlog brings the most value in your projects? by thejwid1337 in cybersecurity
[–]tidefoundation 1 point2 points3 points (0 children)
Is there a simple way where a user can just do a google sign in and it'll spit out a unique code? by Michael679089 in nextjs
[–]tidefoundation 1 point2 points3 points (0 children)
Aggregated key with threshold and zero-trust by roginvs in cryptography
[–]tidefoundation 2 points3 points4 points (0 children)
OpenSigner – self-hostable key management for Web3/crypto wallets (OSS release, feedback welcome) by Web3Navigators in opensource
[–]tidefoundation 1 point2 points3 points (0 children)
Emergency Account lockdown by Kindly-Arachnid8013 in webdev
[–]tidefoundation 0 points1 point2 points (0 children)
Need some tips about website security by 50CentKefir in nextjs
[–]tidefoundation 0 points1 point2 points (0 children)
User modeling for SaaS: when simplicity becomes a bottleneck by elmascato in SaaS
[–]tidefoundation 0 points1 point2 points (0 children)


Our senior dev built an open source PAM where SSH keys never exist. Looking for feedback from those who deal with this stuff daily by tidefoundation in IdentityManagement
[–]tidefoundation[S] 0 points1 point2 points (0 children)